Our Blog

Read our latest blog posts

Malware Analysis and Reverse Engineering: Analysing Magecart Skimmer

We explore the process of Malware Analysis and Reverse Engineering (MA&RE) by analysing Magecart’s skimming malware.

Continue reading

Centralized Log Management with ELK Stack

We discuss the open source logging solution ELK Stack, why it is a popular choice among developers,...

Continue reading

How to use Prometheus to Monitor Complex Applications and Infrastructure

Prometheus is an open-source monitoring software designed to monitor containerized applications in a microservice architecture.

Continue reading

Leveraging STIX and TAXII for better Cyber Threat Intelligence (Part 1)

Using STIX feeds with TAXII enables organizations to exchange cyber threat intelligence in a more structured and...

Continue reading

The Rise of Cybercrime on Telegram and Discord and the Need...

Many Telegram and Discord groups are being used by cybercriminals to perform illegal activities such as selling...

Continue reading

How Browser Extensions can Exploit User Activities for Malicious Operations

All browser extensions may not be malicious, but they are dangerous. We explain how extensions exploit permissions...

Continue reading

MongoDB Sharding 101: Creating a Sharded Cluster

In the first part of this 2-part series on sharding on MongoDB, we describe the various concepts...

Continue reading

Contemporary Single-Page Applications and Frontend Security

This blog details the build process of Single-Page Applications, and explains how they alter the security implications...

Continue reading

The Evolution of the Data Leak Extortion Ecosystem

We explain the evolution of the data leak extortion ecosystem through the advancements made by ransomware groups...

Continue reading

Development of a Language-Independent Microservice Architecture

In this blog we discuss how to create a language-independent microservice using Google's open source RPC and...

Continue reading